語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Protecting Privacy through Homomorph...
~
SpringerLink (Online service)
Protecting Privacy through Homomorphic Encryption
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Protecting Privacy through Homomorphic Encryption/ edited by Kristin Lauter, Wei Dai, Kim Laine.
其他作者:
Laine, Kim.
面頁冊數:
XVI, 176 p. 35 illus., 28 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Security Science and Technology. -
電子資源:
https://doi.org/10.1007/978-3-030-77287-1
ISBN:
9783030772871
Protecting Privacy through Homomorphic Encryption
Protecting Privacy through Homomorphic Encryption
[electronic resource] /edited by Kristin Lauter, Wei Dai, Kim Laine. - 1st ed. 2021. - XVI, 176 p. 35 illus., 28 illus. in color.online resource.
Part 1: Introduction to Homomorphic Encryption (Dai) -- Part 2: Homomorphic Encryption Security Standard: Homomorphic Encryption Security Standard (Laine) -- Part 3: Applications of Homomorphic Encryption: Privacy-preserving Data Sharing and Computation Across Multiple Data Providers with Homomorphic Encryption (Troncoso-Pastoriza) -- Secure and Confidential Rule Matching for Network Traffic Analysis (Jetchev) -- Trusted Monitoring Service (TMS) (Scott) -- Private Set Intersection and Compute (Kannepalli) -- Part IV Applications of Homomorphic Encryption (at the Private AI Bootcamp): Private Outsourced Translation for Medical Data (Viand) -- HappyKidz: Privacy Preserving Phone Usage Tracking (Hastings) -- i-SEAL2: Identifying Spam EmAiL with SEAL (Froelicher) -- PRIORIS: Enabling Secure Suicidal Ideation Detection from Speech using Homomorphic Machine Learning (Natarajan) -- Gimme That Model!: A Trusted ML Model Trading Protocol (Lee) -- HEalth: Privately Computing on Shared Healthcare Data (Hales) -- Private Movie Recommendations for Children (Wagh S) -- Privacy-Preserving Prescription Drug Management Using Homomorphic Encryption (Youmans).
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.
ISBN: 9783030772871
Standard No.: 10.1007/978-3-030-77287-1doiSubjects--Topical Terms:
783419
Security Science and Technology.
LC Class. No.: QA76.9.M35
Dewey Class. No.: 004.0151
Protecting Privacy through Homomorphic Encryption
LDR
:04091nam a22003975i 4500
001
1059513
003
DE-He213
005
20220110071702.0
007
cr nn 008mamaa
008
220414s2021 sz | s |||| 0|eng d
020
$a
9783030772871
$9
978-3-030-77287-1
024
7
$a
10.1007/978-3-030-77287-1
$2
doi
035
$a
978-3-030-77287-1
050
4
$a
QA76.9.M35
072
7
$a
UYA
$2
bicssc
072
7
$a
MAT003000
$2
bisacsh
072
7
$a
UYA
$2
thema
082
0 4
$a
004.0151
$2
23
245
1 0
$a
Protecting Privacy through Homomorphic Encryption
$h
[electronic resource] /
$c
edited by Kristin Lauter, Wei Dai, Kim Laine.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XVI, 176 p. 35 illus., 28 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Part 1: Introduction to Homomorphic Encryption (Dai) -- Part 2: Homomorphic Encryption Security Standard: Homomorphic Encryption Security Standard (Laine) -- Part 3: Applications of Homomorphic Encryption: Privacy-preserving Data Sharing and Computation Across Multiple Data Providers with Homomorphic Encryption (Troncoso-Pastoriza) -- Secure and Confidential Rule Matching for Network Traffic Analysis (Jetchev) -- Trusted Monitoring Service (TMS) (Scott) -- Private Set Intersection and Compute (Kannepalli) -- Part IV Applications of Homomorphic Encryption (at the Private AI Bootcamp): Private Outsourced Translation for Medical Data (Viand) -- HappyKidz: Privacy Preserving Phone Usage Tracking (Hastings) -- i-SEAL2: Identifying Spam EmAiL with SEAL (Froelicher) -- PRIORIS: Enabling Secure Suicidal Ideation Detection from Speech using Homomorphic Machine Learning (Natarajan) -- Gimme That Model!: A Trusted ML Model Trading Protocol (Lee) -- HEalth: Privately Computing on Shared Healthcare Data (Hales) -- Private Movie Recommendations for Children (Wagh S) -- Privacy-Preserving Prescription Drug Management Using Homomorphic Encryption (Youmans).
520
$a
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on homomorphic encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Privacy.
$3
575491
650
2 4
$a
Algebraic Geometry.
$3
670184
650
2 4
$a
Number Theory.
$3
672023
650
2 4
$a
Cryptology.
$3
1211076
650
1 4
$a
Mathematical Applications in Computer Science.
$3
815331
650
0
$a
Security systems.
$3
716291
650
0
$a
Data protection—Law and legislation.
$3
1366218
650
0
$a
Algebraic geometry.
$3
1255324
650
0
$a
Number theory.
$3
527883
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Cryptography.
$3
567927
650
0
$a
Computer science—Mathematics.
$3
1253519
700
1
$a
Laine, Kim.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1366217
700
1
$a
Dai, Wei.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
680269
700
1
$a
Lauter, Kristin.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1067763
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030772864
776
0 8
$i
Printed edition:
$z
9783030772888
776
0 8
$i
Printed edition:
$z
9783030772895
856
4 0
$u
https://doi.org/10.1007/978-3-030-77287-1
912
$a
ZDB-2-SMA
912
$a
ZDB-2-SXMS
950
$a
Mathematics and Statistics (SpringerNature-11649)
950
$a
Mathematics and Statistics (R0) (SpringerNature-43713)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入